what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

FreznoShopSQL.txt

FreznoShopSQL.txt
Posted Aug 11, 2005
Authored by Mike Shema | Site ntobjectives.com

Versions of FreznoShop below 1.4.1 are vulnerable to SQL injection attacks due to a lack of input validation on parameters used in database queries. Sample exploitation provided.

tags | exploit, sql injection
SHA-256 | bb41250b3bed688b2353f87c21a762846fbdd3c0632679bc8735b511054a6def

FreznoShopSQL.txt

Change Mirror Download
FreznoShop Vulnerability Details

Date: May 13, 2005
Mike Shema <mshema@ntobjectives.com>

Versions of FreznoShop
(<http://www.freznoshop.de/>http://www.freznoshop.de/) below 1.4.1
are vulnerable to SQL injection due to the use of unvalidated
parameters in database queries. Some unpatched versions of 1.4.1 are
vulnerable as well.

The value of the 'id' parameter is passed directly to the SQL query
function. No validation of content or filtering of malicious
characters is performed. Database error messages are suppressed such
that they will not reach the web browser, but this does not prevent
arbitrary queries from being constructed. The following URL
demonstrates a value for 'id' that displays a user's username and
password in the HTML response:

<http://site/freznoshop/product_details.php?id=1+UNION+SELECT+1,u_password,u_name,1,1,1,1,1,1,1,1,1+FROM+fs_users+LIMIT+1,1>http://site/freznoshop/product_details.php?id=1+UNION+SELECT+1,u_password,u_name,1,1,1,1,1,1,1,1,1+FROM+fs_users+LIMIT+1,1

The specific problem lies in the product_details.php and
libclasses/lib.shop.php files.

product_details.php, c. line 63
-------------------------------
...
$prod = loadProduct($HTTP_GET_VARS['id']);
...
-------------------------------

libclasses/lib.shop.php, c. line 83
-----------------------------------
...
function loadProduct($id)
{
$table1 = DB_PREFIX .'products p';
$table2 = DB_PREFIX .'products_categories pc';

$sql = db_query("SELECT p.p_id,
p.p_item_nr,
p.p_name,
p.p_desc,
p.p_desc_long,
p.p_image,
p.p_price,
p.p_show_img,
p.p_sp_price,
p.p_has_special,
p.p_has_style,
pc.category_id
FROM $table1, $table2
WHERE p.p_id = pc.product_id
AND p.p_id = $id
");
...
-----------------------------------

Users of this application should download the latest version of
FreznoShop, which implements an is_numeric() check of the $id
parameter in the product_details.php file to prevent this particular
attack.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close